UNVEILING THE MALICIOUS USERS BEHIND THE ANONYMITY NETWORKS

  • Unique Paper ID: 164978
  • Volume: 11
  • Issue: 1
  • PageNo: 145-152
  • Abstract:
  • This project addresses the issue of detecting intruders from hiding behind privacy-protecting anonymity networks. Today’s incident handlers and IT/Security professionals face many challenges in securing their networks and enforcing company policies that protect those networks. A growing concern is the use of anonymous proxy services. However, recent security breaches reveal that SSH and HTTPS have been used to launch attacks by malicious users by taking advantage of these services to hide their identities. They do this for legitimate reasons that include preventing hostile work environments for their users, protecting network assets and data from malicious code or theft, and complying with regulations and company policies. We evaluate our approaches with SSH and HTTPS connections and show that they achieve high performance for both applications. Our detection algorithms are based on the extra latency delays introduced by the presence of the anonymity networks. Since the latency disparity is sensitive to the location of the anonymity network, our algorithms must be evaluated in the most challenging scenarios. This paper explores methods organizations may use to detect and prevent anonymous proxy usage. To demonstrate the robustness of our approach in the Tor case, we tested our method in multiple Tor circuit node selection strategies. The approach can be applied to other applications meeting the same criteria.

Cite This Article

  • ISSN: 2349-6002
  • Volume: 11
  • Issue: 1
  • PageNo: 145-152

UNVEILING THE MALICIOUS USERS BEHIND THE ANONYMITY NETWORKS

Related Articles